Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
1921
Evaluation of Network Security Service Provider Using 2-Tuple Linguistic Complex q-Rung Orthopair Fuzzy COPRAS Method
Published 2022-01-01“…However, many enterprises lack the necessary resources to secure information security, and selecting the best network security service provider has become a real issue for many enterprises. …”
Get full text
Article -
1922
Enhancing Tenure Security: A Case Study of the Social Forestry Scheme in the State Forestry Corporation, Malang District, East Java
Published 2024-03-01Subjects: Get full text
Article -
1923
A Collaborative Data Network for the Asia Oceania Region Enabled by Emerging Technologies to Foster Innovation in a Secure and Open Environment
Published 2025-01-01“…To ensure ownership is always clear, and subsequent use of data is tracked, we harness blockchain technology alongside smart contracts and decentralised identifiers to allow secure discovery and sharing. The use of blockchain will ensure the information about each dataset (metadata, provenance, and access rights) is immutably connected to each dataset. …”
Get full text
Article -
1924
-
1925
Improvement of the conceptual principles of activity of the Ministry of Internal Affairs of Ukraine as a subject of the formation and development of the internal security environment of the state
Published 2024-06-01Subjects: “…security environment…”
Get full text
Article -
1926
Ecological security driving mechanisms and optimization of zoning in Chinese urban agglomerations: A case study of the central plains urban agglomeration
Published 2025-02-01Subjects: “…Ecological security…”
Get full text
Article -
1927
-
1928
Secure Communication Scheme Based on a New 5D Multistable Four-Wing Memristive Hyperchaotic System with Disturbance Inputs
Published 2020-01-01“…In addition, the circuit implementation scheme is also proposed. Then, a secure communication scheme based on the proposed 5D multistable FWMHS with disturbance inputs is designed. …”
Get full text
Article -
1929
A Secure and Reliable Fog-Enabled Architecture Using Blockchain With Functional Biased Elliptic Curve Cryptography Algorithm for Healthcare Services
Published 2024-12-01“…With such a wide range of characteristics, new security and privacy concerns arise. Due to the safe transmission, arrival, and access, as well as the availability of medical devices, security creates new issues in the area of healthcare. …”
Get full text
Article -
1930
-
1931
Enhancing aviation control security through ADS-B injection detection using ensemble meta-learning models with Explainable AI
Published 2025-01-01“…The increasing use of Automatic Dependent Surveillance-Broadcast (ADS-B) technology in flight control systems has created many serious concerns.These weaknesses threaten the security and safety of our aviation industry. Therefore, to enhance aviation control security and better deal with these problems, this research focuses on developing a strong ADS-B injection detection system. …”
Get full text
Article -
1932
Research on optimization of emergency supplies customs clearance strategy from the perspective of public health security based on Chinese trade data
Published 2025-01-01“…BackgroundThis study is significant for improving the accuracy of Customs’ cross-border supervision of emergency supplies and ensuring the timely clearance of these essential goods.MethodsTo ensure both the convenience and security of Customs oversight regarding emergency supplies, this study first systematically collects and organizes representative data on the import and export trade of these supplies. …”
Get full text
Article -
1933
“Sustainable security” through river enlargements: A political ecology of nature-based solutions and flood control in the Rhone Valley, Switzerland
Published 2023-10-01“…The largest ongoing river training project in Switzerland, the so-called Third Correction of the Rhone in the Valais, builds on nature-based solutions (river enlargements and renaturation) while official documents and discourses also refer to an ill-defined notion of “sustainable security” and the goal of controlling floods. Drawing on qualitative data from stakeholder interviews and analysis of official documents, this paper examines the concept of sustainable security, as it is applied to the river project in terms of a balance between security and environmental concerns, the relationship between the three pillars of sustainability, and the opportunities of the population to debate the spatial development of the Rhone Valley. …”
Get full text
Article -
1934
The impact of staple crop price instability and fragmented policy on food security and sustainable development: a case study from Bangladesh
Published 2025-02-01Subjects: “…Food security…”
Get full text
Article -
1935
A secure and energy-efficient routing using coupled ensemble selection approach and optimal type-2 fuzzy logic in WSN
Published 2025-01-01“…This research contributes significantly to the WSN field by providing a comprehensive routing solution that integrates energy conservation, security, and QoS, ultimately extending the lifespan of WSNs and boosting confidence in critical applications, paving the way for implementation scenarios that require secure, low-power, and real-time data transmission.…”
Get full text
Article -
1936
An Intelligent Big Data Security Framework Based on AEFS-KENN Algorithms for the Detection of Cyber-Attacks from Smart Grid Systems
Published 2024-06-01“…Here, an AdaBelief Exponential Feature Selection (AEFS) technique is used to efficiently handle the input huge datasets from the smart grid for boosting security. Then, a Kernel based Extreme Neural Network (KENN) technique is used to anticipate security vulnerabilities more effectively. …”
Get full text
Article -
1937
The roles of urban agriculture to household food security: a case study in Kirkos sub-city, Addis Ababa city, Ethiopia
Published 2025-02-01Subjects: “…food security…”
Get full text
Article -
1938
Securing E.U. Democracy and Citizenship at what Costs? Reflections on Defence Spendings Between North-South and West-East Divergens
Published 2024-12-01Subjects: Get full text
Article -
1939
DEMOCRATIC PRINCIPLES AND THE ROLES OF TRADITIONAL POLITICAL INSTITUTIONS IN PROMOTING PEACE AND SECURITY IN NORTHERN NIGERIA: A CASE STUDY OF GOMBE STATE.
Published 2024-06-01“… The adoption of Western Democracy after independence has come with a lot of changes to the hitherto roles and powers of traditional political institutions of building peace and security generally inNorthern Nigeria and Gombe in particular. …”
Get full text
Article -
1940
Food Availability, Accessibility, and Affordability through the Scope of Food Security Level and Food Environment Perception in Mexico City’s Marginated Area
Published 2025-02-01Subjects: “…food security…”
Get full text
Article